Skip to main content

Full text of "USPTO Patents Application 09870801"

See other formats


4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


303750.01 


KEKER & VAN NEST, LLP 
JOHN W. KEKER - #49092 
MICHAEL H. PAGE - #154913 
710 Sansome Street 
San Francisco, CA 94111-1704 
Telephone: (415)391-5400 
Facsimile: (415)397-7188 

INTERTRUST TECHNOLOGIES CORPORATION 

DOUGLAS K. DERWIN - #1 1 1407 

MARK SCADINA - #173103 

JEFF MCDOW - #184727 

4800 Patrick Henry Drive 

Santa Clara, CA 95054 

Telephone: (408) 855-0100 

Facsimile: (408) 855-0144 

Attorneys for Plaintiff and Counter-Defendant 
INTERTRUST TECHNOLOGIES CORPORATION 


UNITED STATES DISTRICT COURT 
NORTHERN DISTRICT OF CALIFORNIA 


INTERTRUST TECHNOLOGIES 
CORPORATION, a Delaware corporation, 

Plaintiff, 


v. 


MICROSOFT CORPORATION, a 
Washington corporation, 


Defendant. 


AND COUNTER ACTION. 


Case No. C 01-1640 SBA (MET) 

Consolidated with C 02-0647 SBA 

INTERTRUST'S PATENT LOCAL RULE 
4-2 PRELIMINARY CLAIM 
CONSTRUCTIONS AND 
IDENTIFICATION OF EVIDENCE 


PatL.R. 4-2(a) Preliminary Claim Constructions 

The following constitute InterTrust's proposed definitions for claim terms identified in 

the parties' Rule 4-1 disclosures. InterTrust reserves the right to modify these definitions in light 

of definitions, evidence or arguments propounded by Microsoft. 

Capitalized terms occurring in definitions represent separately-defined terms and should 

1 


intertrust's patent local rule 4-2 preliminary claim constructions and 

identification of evidence 
Case no. c 01-1640 sba (mej), consolidated with c 02-0647 sba 


1 (I be given the same meaning as in the separate definition. 

2 || The designation of a definition as formal English" means that InterTrust believes the 

3 II defined term should have its normal English meaning, with no definition being necessary. 

4 Submission of a definition in such cases does not constitute a waiver of InterTrusfs right to 
II j 

5 || contend that no such definition is necessary. 

6 || These terms are defined for the claims specified in the definition. InterTrust reserves the 

7 || right to assert that these terms should be interpreted differently in contexts other than those 

8 || specified. 

9 || Reference citations are to "extrinsic evidence** listed in Section II of this document 

10 || Unless otherwise noted, the references constitute dictionaries and the citations are to definitions 

11 || of the designated temis in such dictionaries. 

II * 

12 II A. Individual Claim Terms. 

Access. (193.15, 193.19, 912.8, 912.35, 861,58, 683.2, 721.34) 1 
To obtain something so it can be used. 
References: 1,2,6. 
Addressing (861.58) 

Referring to a location where information is stored. 
Reference: 3. 

Allowing, allows (912.35, 193.1, 193.11, 193.15, 193.19) 

Normal English: permitting, permits; letting happen, lets happen. 
Reference: 4. 
Applying in combination (683.2) 

Using more than one Rule to Govern a Secure Container Governed Item. 
Arrangement (721.34) 


13 
14 

15 

16 

17 

18 

19 

20 
21 
22 
23 
24 
25 
26 

27 . 

1 Patent and Claim numbers are denoted herein in the format "xxx.yy", where "xxx" is the last 

28 || three digits of the patent number and "YY" is the claim number. 

2 


Normal English: a collection of things that have been arranged. In context, the 
term can apply to an organization of hardware and/or software and/or data. 

Reference: 4. 


303750.01 


INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


303750.01 


Aspect (900.155, 912.8, 861.58, 683.2) 

Feature, element, property or state. 
Associated With (912.8, 193.1, 193.11, 193.15, 683.2) 

Having a relationship with. 

Authentication (193.15) 

In context, Identifying (e.g., a person, device, organization, document, file, etc.). 
Includes uniquely identifying or identifying as a member of a group. 

Authorization Information/Authorize/Not Authorize (193.15, 193.19) 

Authorize: , 

Normal English: permit. 

References: 4. 

Authorization Information: 

In context: Information (e.g., a key) received if an action is Authorized. 
See Specific Information for the definition of Information. 

Budget (193.1) 

Information specifying a limitation on usage. See Specific Information for the 
definition of Information. 

Reference: 4. 

Budget control (193.1) 

The term is explicitly defined in the claim as a Control "including a budget 
specifying the number of copies which can be made of said digital file." 

Can be (193.1) 

Normal English: the specified act is able or authorized to be carried out In 
context, this means the number of copies allowed to be made. 

Reference: 4. 
Capacity (683.2) 

Normal English: "ability," or "capability." 

Reference: 4. _ 

Clearinghouse (193.19) 

A provider of financial and/or administrative services for a number of users; or an 
entity responsible for the collection, maintenance, and/or distribution of materials, 

3 

INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


1 

2 
3 
4 
5 
6 
7 
8 
9 

10 
11 
12 
13 
14 
15 
16 
17 
18 
19 

20 

21 

22 

23 

24 

25 

26 

27 

28 


information, licenses, etc. 
Compares/Comparison (900.155) 
Normal English: 

Compares: examines for the purpose of noting similarities and differences. 
Reference: 4. 

Comparison: the act of comparing. 

Reference: 4. 

Component Assembly (912.8, 912.35) 

Components are code and/or data elements that are independently deliverable. A 
Component Assembly is two or more components associated together. 
Component Assemblies are executed to perform operating system or applications 
tasks. 

Contained/Contain/Contaioing (683.2, 912.8, 912.35) 

Normal English: to have within or to hold. In the context of an element 
contained within a data structure (e.g., a secure container), the contained element 
may be either directly within the container or the container may hold a reference 
indicating where the element may be found. 

Reference: 4. 

Control (n) (193.1, 193.11, 193.15, 193.19, 891.1) 

Information and/or programming Governing operations on or use of Resources 
(e.g., content) including (a) permitted, required or prevented operations, (b) the 
nature or extent of such operations or (c) the consequences of such operations. 

Control (v)/Controlling (861.58, 193.1) 

Normal English: to exercise authoritative or dominating influence over; direct 

Reference: 4. 

jCopied file (193J.1). 

A Digital File that has been Copied. 

Copy, copied, copying (193.1, 193.11, 193.15, 193.19) 

Reproduce, reproduced, reproducing. The reproduction may incorporate all of the 
original item, or only some of it, and may involve some changes to the item as 
long as the essential nature of the content remains unchanged. 

References: 1,4,6. 


303750.01 


INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SEA 


1 

2 
3 
4 

5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


Copy control (193.1) 

A Control used to determine whether a Digital File may be Copied and the Copi« 
Digital File stored on a second device. 

Creating/Creation (86 1 .58) 

Normal English: Creating means producing; Creation means the act of creating. 

Reference: 4. 
Data item (891.1) 

A unit of digital information. 

References: 2,3. 

Derive/Derives (900.155) 

Normal English: obtain, receive or arrive at through a process of reasoning or 
deduction. In the context of computer operations, the 'process of reasoning or 
deduction" constitutes operations carried out by the computer. 

Reference: 4. 

Descriptive Data Structure (861.58) 


Machine-readable description of the layout and/or contents of a rights 
management data structure (e.g., a Secure Container). 

Designating (721.1) 

Normal English: indicating, specifying, pointing out or characterizing. 

Reference: 4. 
Device Class (721.1) 

A group of devices which share at least one attribute. 
Digital File (193.1, 193.11, 193.15, 193.19) 

A named collection of digital information. 

Reference: 3 (definition of "file"). 

Digitally signing/digital signature (721.1) 

Digital signature: A digital value, verifiable with a Key, that can be used to 
determine the source and/or integrity of a signed item (e.g., a file, program, etc.). 

Digitally signing is the process of creating a digital signature. 


303750.01 


INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


Entity/Entity's control (891 . 1) 

Entity: A person or organization. 

Entity's Control: Control belonging to .or corning from an Entity. 

Environment (912.35, 900.155, 891.1, 683.2, 721.34) 

Capabilities available to a program running on a computer or other device or to 
the user of a computer or other device. Depending on the context, the 
environment may be in a single device (e.g., a personal computer) or may be 
spread among multiple devices (e.g., a network). 

References: 6. 

Executable Programming/Executable (912.8, 912.35, 721.34) 

A computer program that can be run, directly or through interpretation. 
Reference: 3. 

Execution space (912.8) ' 

Resource which can be used for execution of a program or process. 

Execution space identifier (912.8) 

Information Identifying an Execution Space. See Specific Information for 
definition of Information. 

Generates/Generating (900.155, 861.58) 

Normal English: creates/creating or produces/producing. 

Reference: 4. 

Govern/Governed/Governed Item (891.1, 683.2) 

To Govern: to control an item or operation in accordance with criteria established 
by the holder of one or more rights relating to the item or operation or a party 
authorized to establish such criteria. 

Governed Item: an item that is Governed. 

Reference: 4. 

"Halting (900.155) 

Normal English: suspending. 

Referencer-4: - 


303750.01 


Host Processing Environment (900. 155) 

This term is explicitly defined in the claim and therefore needs no additional 

6 

INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


definition. It consists of those elements listed in the claim. 

Without waiving its position that no separate definition is required, if required to 
propose such a definition, InterTrust proposes the following: a Protected 
Processing Environment incorporating software-based Security. 

Identifier (193.15, 912.8) 

Information used to Identify something or someone (e.g., a password). 

Identify/identifying (193.1 1, 912.8, 912.35, 861.58) 

Normal English: To establish/establishing the identity of or to 
ascertain/ascertaining the origin, nature, or definitive characteristics of. 

Reference: 4. 

Including (912.8, 912.35, 900.155, 861.58, 193.1, 193.11, 193.15, 193.19, 891.1, 683.2) 

Normal English: -depending on the context, this means containing as a secondary 
or subordinate element, or considering with or placing into a group, class, or total, 

Reference: 4. 

Information previously stored (900.155) 

Normal English: Information stored at an earlier time. See Specific Information 
for the definition of Information. 

Integrity programming (900. 155) 

This term is fully defined in the claim, which specifies the steps the integrity 
programming must perform. Integrity programming is programming that 
performs the recited steps. The term therefore needs no additional definition. 

Without waiving its position that no separate definition is required, if required to 
propose such a definition, InterTrust proposes the following: programming that 
checks the integrity of a Host Processing Environment. 

Key (193.19) 

Information used to encrypt, decrypt, sign or verify other information. 

Load Module (9T2.8, 721.1)""' 

An Executable unit of code designed to be loaded into memory and executed, plus 
associated data. 

References: 3. 

Machine Check Programming (900.155) 

Programming that checks a host processing environment and derives information 
from an Aspect of the host processing environment. 


303750.01 


INTERTRUSTS PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


Metadata Information (861.58) 

Information about information. Metadata Information may describe the attributes 
o'f a rights management data structure as well as processes used to create and/or 
use it. 

Opening secure containers (683.2) 

i 

Providing Access to the contents of a Secure Container (e.g., by decrypting the 
contents, if the contents are encrypted). 

Operating environment (891.1) 

Environment in which programs function. 

References: 6. 

Organize, organization, organization information (861.58) 

In the context of organization of a Secure Container, these terms refer to contents 
required or desired (including Information used to categorize these contents); or 
Information used to specify a particular location for content See Specific 
Information for the definition of Information. 

Portion (193.1, 193.11, 193.15, 193.19, 912.8, 912.35, 861.58) 

Normal English: a part of a whole. The presence of a '^portion* 5 does not exclude 
the presence of the whole (e.g., storage of an entire file necessarily includes 
storage of any portions into which that file may be subdivided). 

Reference: 4. 

Prevents (721.34) 

Normal English: keeps from happening. 

Reference: 4. 

Processing Environment (912.35, 900.155, 721.34, 683.2) 
Processing: manipulating data. 

3. ... 


Processing Environment: An Environment used for Processing. A Processing 
Environment may be made up of one device or of more than one device linked 
together. 

Protected Processing Environment (683.2, 721.34) 

—Processing Environment in which processing and/or data is at least in part 
protected from Tampering. The level of protection can vary, depending on the 
threat. 


8 


303750.01 


INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12| 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


Protecting (683.2) 

Normal English: keeping from being damaged, attacked, stolen or injured. 

Reference: 4. 
Record (912.8, 912.35) 

Collection of related items of data treated as a unit 

4 

References: 1. 

Rendering (193.11, 193.15, 193,19) 

Playing content through an audio output (e.g., speakers) or displaying content on 
a video output (e.g., a screen). 

Required (912.8, 861.58) 

Normal English: a thing that is required is a thing that is obligatory or demanded. 

Reference: 4. 

Resource processed (891 .1) 

Resource: computer software, computer hardware, data, data structure or 
information. 

Resource processed: a Resource subject to being Processed, i.e., computer 
software, data, data structure or information. See Processing Environment for a 
definition of Processed. 

Rule (861.58, 683.2) 

See Control. 

Secure (193.1, 193.11, 193.15, 912.35, 861.58, 891.1, 683.2, 721.34) 

One or more mechanisms are employed to prevent, detect or discourage misuse of 
or interference with information or processes. Such mechanisms may include 
concealment, Tamper Resistance, Authentication and access control. 
Concealment means that it is difficult to read information (for example, programs 
may be encrypted). Tamper Resistance and Authentication are separately defined. I 
Access control means that Access to information or processes is limited on the 
basis of authorization. Security is not absolute, but is designed to be sufficient for 
a particular purpose. 

Reference: 6. 

Secure Container (912.35, 861.58, 683.2) 


Container: Digital File Containing linked and/or embedded items. 
Reference: 3, 5. 


303750.01 


INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 

20 

21 

22 

23 

24 

25 

26 

27 

28 


303750.01 


Secure Container: A Container that is Secure. 

Secure container governed item (683.2) 

Information and/or programming Contained in a Secure Container and Governed 
by an associated Secure Container Rule. 

j Secure container rule (683.2) 

Rule that at least in part Governs a Secure Container Governed Item. 
Secure Database (193.1, 193.11, 193,15) 

Database: an organized collection of information. 

References: 2. 

Database that is Secure. 
Secure Execution Space (721.34) 

Execution Space that is Secure. * 

Secure Memory/Memory (193.1, 193.11, 193.15) 

Memory: a component of a computer or other device where information can be 
stored and retrieved. 

References: 3,4. 

Secure Memory: Memory in which Information is handled in a Secure manner. 
See Specific Information for the definition of Information. 

Secure Operating Environment (891.1) 

An Operating Environment that is Secure. 

Securely Applying (891.1) 

Requiring that one or more Controls be complied with before content may be 
used. The operation of requiring that the Control(s) be complied with must be 
carried out in a Secure manner. 

Securely Assembling (912.8, 912.35) 

Associating two or more Components together to form a Component Assembly, 
in a Secure manner. See Component Assembly for the definition of Component 

Securely Processing (891.1) 

- -^oeessing <)ccinTing-in a^ecureinannerr^See-Processing Environment for the 
definition of Processing. 


10 

INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


1 

2 
3 
i 

5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


303750.01 


Securely Receiving (891.1) 

Receiving has its normal English meaning: acquiring or getting. 
Reference: 4. 

Securely Receiving means receipt occurring in a Secure manner. 
Security (721.1, 721.34) 

Relating to being Secure. 

Security Level/Level of Security (721.1; 721.34, 912.8) 

Information that can be used to determine how Secure something is (e.g., a 
device, Tamper Resistant Barrier or Execution Space). , 

Specified information/specific information (912.35, 861.58) 

Normal English meaning: 

Specific: explicitly set forth or definite. 

Reference: 4. 

To specify: to state explicitly or in detail. 
Reference: 4. 

Information: nonaccidental signal(s) or characters) used in a computer or 
communication system. Information includes programs and also includes data. 

Reference: 4. 

Tamper/Tampering (683.2, 721.1, 721.34, 900.155) 

To Use (including observe), alter or interfere with in an unauthorized manner. 

Reference: 8. 

Tamper Resistant/Tamper Resistance (721.1, 721.34, 900.155) 

- Maldng-T^pering more-diffieultv and/or allowing-detection of Tampering. 
Tamper Resistant Barrier (721.34) 

Hardware or software that provides Tamper Resistance. 
Tamper Resistant Software (900. 1 55) 

Software designed to make it more difficult to Tamper with the software. 

References: 7, 8. 


11 

INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1 640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


Use (912.8, 912.35, 861.58, 193.19, 891.1, 683.2, 721.1) 

Normal English: to put into service or apply for a purpose, to employ. 
Reference: 4. 

User controls (683.2) 

i Hardware feature of an apparatus allowing a user to operate the apparatus (e.g., a 
keyboard). 

Validity (912.8) 

A property of something (e.g., a Record) indicating that it is appropriate for use. 

Virtual Distribution Environment (900. 1 55) 

This term is contained in the preamble' of the claim and should not be defined, 
other than as requiring the individual claim elements. 

Without waiving its position that no separate definition is required, if required to 
propose such a definition, InterTrust proposes the following: secure, distributed 
electronic transaction management and rights protection system for contiblling 
the distribution and/or other usage of electronically provided and/or stored 
information. 

I Claim Phrases and Clauses 

193.1 

Receiving a digital file including music (1 93. 1) 

See Receiving a digital file (193.1 1). This phrase is interpreted the same, except 
that the file includes music. 

Budget specifying the number of copies which can be made of said digital file (193.1) 

Normal English, incorporating the separately defined terms: a Budget stating the 
, number of Copies that Can Be made of the Digital File referred to earlier in the 
claim. 

Controlling the copies made of said digital file (193.1) 

The nature of this operation is further defined in later claim elements. In context, 
the Copy Control determines the conditions under which a Digital File may be 
Copied and the Copied File stored on a second device. 

Determining whether said digital file may be copied and stored on a second device 
based on at least said copy control (193.1) 

Normal English, incorporating the separately defined terms: Using the Copy 

GonfeoHn^decrding whetherthe Digital Fife referred to earlier in the claim may be 

Copied and the Copied Digital File stored on a second device. 


12 


303750.01 


INTERTRUSrS PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


303750.01 


If said copy control allows at least a portion of said digital file to be copied and 
stored on a second device (193.1) 

Normal English: a "yes" result is received in the step Determining whether said 
digital file may be copied and stored on a second device based on at least said 
copy control (193.1). 

Copying at least a portion of said digital file (193.1, 193.11, 193.15, 193.19) 

Nonnal English, incorporating the sieparately defined terms: Copying at least a 
y Portion of die Digital File referred to earlier in the claim. 

Transferring at least a portion of said digital file to a second device (193.1, 193.1 1, 
193.15,193.19) 

Nonnal English, incorporating the separately defined terms: at least a Portion of 
the Copied Digital File is sent to a second device. 

Storing said digital file (193.1, 193.11, 193.15) 

Nonnal English: that which was transferred in the transferring step is stored. 

193.11 

Receiving a digital file (193.1, 193.11, 193.15, 193.19) 

Normal English, incorporating the separately defined term: a Digital File is 
obtained. 

This phrase has been designated by Microsoft for interpretation under § 1 12(6). 
InterTrust objects to such designation. Without waiver of such objection, as is 
required by the Local Rules, InterTrust hereby identifies acts conesponding to 
this term: 

Claim elements specifying the act of receiving a file, or the act of establishing 
communications, map onto a large number of structures and acts disclosed in the 
specification, many of which constitute alternate embodiments. These include 
obtaining a file or communicating through telecommunications links, satellite 
transmissions, physical exchange of media, network transmissions, etc. 

Determining whether^aid digital file may be copied and stored on a second device 
based on said first control (193.1 1) 


Nonnal English, incorporating the separately defined terms: Using the Control to 
decide whether the Digital File may be Copied and the Copied Digital File stored 
on the second device. 

Identifying said second device (193.1 1) 

Nonnal English, incorporating the separately defined term: the second device is 
identified. - 


13 


INTERTRUST' S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


Whether said first control allows transfer of said copied file to said second device 
(193.11) 

l^onnal English, incorporating the separately defined terms: Using the first 
Control to decide if the Copied Digital File may be sent to the second device. 

Said determination based at least in part on the features present at the device 
(193.11) 

Normal English: the decision referred to earlier in the claim is based at least in 
part on characteristics of the second device. 

If said first control allows at least a portion of said digital file to be copied and 
stored on a second device (193.1 1) 

See If said copy control allows at least a portion of said digital file to be.copied 
and stored on a second device (193.1). TTie definitions are the same. 

Copying at least a portion of said digital file (193,1, 193.11, 193.15* 193.19) 

* See Copying at least a portion of said digital file (193.1). The definitions are the 
same. ( 


. 14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


303750.01 


See Transferring at least a portion of said digital file to a second device (193.1). 
The definitions are the same. 

Storing said digital file (193.1, 193.11, 193.15) 

See Storing said digital file (193.1). The definitions are the same. 

193.15 

Receiving a digital file (193.1, 193.1 1, 193.15, 193.19 

, See Receiving a digital file (193.11). The definitions are the same. 

An authentication step comprising (193.15) 

Normal English, incorporating the separately defined term: a step involving 
- Authentication — - - - ? - - 

Accessing at least one identifier associated with a first device or with a user of said 
first device (193.15) 

Normal English, incorporating the separately defined terms: Accessing an 
Identifier Associated With a device or a user of the device. 

Determining^whether ^aid^dentifier is associated with a device and/or user 
authorized to store said digital file (193.15) 

Normal English, incorporating the separately defined terms: deciding whether the 
Identifier is Associated With a device or user with authority to store the Digital 

14 

INTERTRUSTS PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


File. 

Storing said digital file in a first secure memory of said first device, but only if said 
device and/or user is so authorized, but not proceeding with said storing if said device 
and/or user is not authorized (193.15) 

Normal English, incorporating the separately defined terms: this step proceeds or 
does not proceed based on the preceding determining step. If this step proceeds, 
the Digital File is stored in a Secure Memory of the first device. 

Storing information associated with said digital file in a secure database stored on 
said first device, said information including at least one control (193.15) 

Normal English, incorporating the separately defined terms: storing a Control 
Associated With the Digital File in a Secure Database stored at the first device. 

Determining whether said digital file may be copied and stored on a second device 
based on said at least one control (193.15) 

See Determining whether said digital file may be copied and stored on a second 
device based on at least said copy control (193.1). The definitions are the same. 

If said at least one control allows at least a portion of said digital file to be copied 
ind stored on a second device (193.15) 

See If said first control allows at least a portion of said digital file to be copied 
and stored on a second device (193.1 1). The definitions are the same. 

Copying at least a portion of said digital file (193.1, 193.11, 193.15, 193.19) 

See Copying at least a portion of said digital file (193.1). The definitions are the 
same. 

Transferring at least a portion of said digital file to a second device (193.1, 193.11, 
93.15, 193.19) 

See Transferring at least a portion of said digital file to a second device (193.1) 
The definitions are the same. 

Storing said digital file (193.1, 193.11, 193.15) 

See Storing said digital file (193.1) The definitions are the same. 

193.19 

Receiving a digital file at a first device (193.19) 

- . See Receiving a digital file (193.1 1). The definitions are the same. 

Establishing communication between said first device and a clearinghouse located at 
location remote from said first device (193.19) 

Normal English, incorporating the separately defined term: sending information 
from the first device to the Clearinghouse and/or the first device receiving 
information from the Clearinghouse. 

15 

INTERTRUSTS PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


This phrase has been designated by Microsoft for interpretation under § 1 12(6). 
InterTrust objects to such designation. Without waiver of such objection, as is 
required by the Local Rules, InterTrust hereby identifies acts corresponding to 
this term: 

Claim elements specifying the act of receiving a file, or the act of establishing 
i communications, map onto a large number of structures and acts disclosed in the 
specification, many of which constitute alternate embodiments. These include 
obtaining a file or communicating through telecommunications links, satellite 
transmissions, physical exchange of media, network transmissions, etc. 

Using said authorization information to gain access to or make at least one use of 
| said first digital file (193.19) 

Noimal English, incorporating the separately defined terms: the Authorization 
Information is used in a process of Accessing or Using the Digital File. 

Including using said key to decrypt at least a portion of said first digital file (193.19) 

Normal English, incorporating the separately defined terms: this step further 
describes the **using said authorization information" step, and requires th&t the 
earlier step include using the Key in a process of decrypting of at least a Portion 
of the Digital File. 

Receiving a first control from said clearinghouse at said first device (193.19) 

Normal English, incorporating the separately defined terms: the first device 
acquires or gets a Control from the Clearinghouse. 

This phrase has been designated by Microsoft for interpretation under § 1 12(6). 
InterTrust objects to such designation. Without waiver of such objection, as is 
required by the Local Rules, InterTrust hereby identifies acts corresponding to 
this term: 


€3aim~elements specifying the act of receiving a file, or the act of establishing 
communications, map onto a large number of structures and acts disclosed in the 
, specification, many of which constitute alternate embodiments. These include 
obtaining a file or communicating through telecommunications links, satellite 
transmissions, physical exchange of media, network transmissions, etc. 

Storing said first digital file in a memory of said first device (193.19) 

Normal English, incorporating the separately defined terms: the Digital File is 
stored at the first device. 

Using said first control to determine whether said first digital file may be copied and 
stored on a second device (193.19) 

See Determining whether said digital file may be copied and stored on a second 
raHeast^aid copy-contrc^ are the same. 


16 


303750.01 


INTERTRUST^ PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
-26- 
27 
28 


If said first control allows at least a portion of said first digital file to be copied and 
stored on a second device (193.19) 

See If said first control allows at least a portion of said digital file to be copied 
and stored on a second device (193.1 1). The definitions are the same. 

Copying at least a portion of said first digital file (193.1, 193.11, 193.15, 193.19) 

See Copying at least a portion of said digital file (193.1). The definitions are the 
same. 

Transferring at least a portion of said first digital file to a second device including a 
memory and an audio and/or video output (193.19) 

See Transferring at least a portion of said digital file to a second device (193.1). 
The definitions are the same, except that the second device has an audio or video 
output or both (e.g., a speaker, a screen, etc.). 

Storing said first digital file portion (193.19) 

Normal English, incorporating the separately defined terms: the DigitalFile 
Portion is stored. 

721.1 

Digitally signing a first load module with a first digital signature designating the 
first load module for use by a first device class (72 1 . 1) 

Normal English, incorporating the separately defined tenns: generating a Digital 
Signature for the first Load Module, the Digital Signature Designating that the 
first Load Module is for use by a first Device Class. 

Digitally signing a second load module with a second digital signature different from 
the first digital signature, the second digital signature designating the second load module 
for use by a second device class having at least one of tamper resistance and security level 
iifferent from the at least one of tamper resistance and security level of the first device 
:lass (721.1) 

Normal English, incorporating the separately defined terms: generating a Digital 
Signature for the second Load Module, the Digital Signature Designating that the 
second Load Module is for use by a second Device Class. This element further 
requires that the second Device Class have a different Tamper Resistance or 
Security Level than the first Device Class. 

Distributing the first load module for use by at least one device in the first device 
:lass (721.1) 

Normal English, incorporating the separately defined terms: distributing the first 
Load Module so that it can be used by a device in the first Device Class. 

Mstributing^the second loadmodule for use by at least one device in the second 
levice class (721.1) 

Normal English, incorporating the separately defined terms: distributing the 
second Load Module so that it can be used by a device in the second Device 

17 


INTERTRUSTS PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 



Class. 
721.34 , 

t 

Arrangement within the first tamper resistant barrier (721.34) 

Normal English, incorporating the separately defined terms: an Arrangement 
i protected by the first Tamper Resistant Barrier, the Arrangement operating as 
described in the claim. 

Prevents the first secure execution space from executing the same executable 
accessed by a second secure execution space having a second tamper resistant barrier with 
a second security level different from the first security level (721.34) 

Normal English, incorporating the separately defined terms: stops the first Secure 
Execution Space from executing (e.g. running a program) an Executable accessed 
by a second Secure Execution space. The first and second Secure Execution 
Spaces have Tamper Resistant Barriers that have different Security Levels. 

683.2 

First secure container having been received from a second apparatus (683.2) 

Normal English, incorporating the separately defined term: the Secure Container 
was acquired from a second apparatus. The second apparatus is different from the 
first apparatus. 

Aspect of access to or use of (683.2, 861.58) 

Normal English, incorporating the separately defined terms: Aspect and Access 
to or Use of Those terms fully define the phrase, so that no other definition is 
possible. 

First secure container rule having been received from a third apparatus different 
from said second apparatus (683.2) 

Normal English, incorporating the separately defined terms: this term requires 
, that the first Secure Container Rule was acquired from a third apparatus. The 
third apparatus is different from the second apparatus or the first apparatus. 

Hardware or software used for receiving and opening secure containers (683.2) 

Normal English, incorporating the separately defined terms: computer hardware 
or programming that acquires Secure Containers and Opens the Secure Containers 
(see Opening Secure Containers). 

This phrase has been designated by Microsoft for interpretation under § 1 12(6). 

--InterTrust objects to such designation. Without waiver of such objection, as is 

required by the Local Rules, InterTrust hereby identifies structures corresponding 
to this term: 


Structures corresponding to this element include Processors) 4126 and/or 
software running on Processors 4126 (including Protected Processing 
Environment 650) and Communications Device 666. 


18 


INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


Said secure containers each including the capacity to contain a governed item, a 
secure container rule being associated with each of said secure containers (683.2) 

Normal English, incorporating the separately defined terms: the Secure 
Containers previously referred to are each able to contain a Governed Item, and 
each Secure Container has an associated Secure Container Rule. 

Protected processing environment at least in part protecting information contained 
in said protected processing environment from tampering by a user of said first apparatus 

(683.2) 

Normal English, incorporating the separately defined terms: a Protected 
Processing Environment contains Information. Hie Protected Processing 
Environment protects the contained Information from Tampering by a user. The 
protection may be parti&l rather than complete. See Specific Information for the 
definition of Information. ( 

Hardware or software used for applying said first secure container rule and a 
second secure container rule in combination to at least in part govern at least one aspect of 
access to or use of a governed item contained in a secure container 

(683.2) 

Normal English, incorporating the separately defined terms: computer hardware 
or programming that uses the first Secure Container Rule and a second Secure 
Container Rule. These rules are Applied in Combination to Govern a Governed 
Item contained in a Secure Container. 

This phrase has been designated by Microsoft for interpretation under § 1 12(6). 
InterTrust objects to such designation. Without waiver of such objection, as is 
required by the Local Rules, InterTrust hereby identifies structures corresponding 
to this term: 

Structures corresponding to this element include Processor(s) 4126 and/or software 
running on Processors 4126 (including Protected Processing Environment 650). 

Hardware or software used for transmission of secure containers to other 

apparatuses or for receipt of secure containers from other apparatuses: (683.2) 

Normal English, incorporating the separately defined terms: computer hardware 
or programming that sends Secure Containers to other apparatuses (e.g., other 
computers) or acquires Secure Containers from other apparatuses. 

-This phrase has-been designated by Microsoft for interpretation under § 1 12(6). 
InterTrust objects to such designation. Without waiver of such objection, as is 
required by the Local Rules, InterTrust hereby identifies structures corresponding 
to this term: 

Structures corresponding to this element include Processors) 4126 and/or 
software running on Processors 4126 (including Protected Processing 
Environment 650) and Communications Device 666. 


19 


INTERTRUST S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


861.58 

Creating a first secure container (861 .58) 

i 

This term is contained in the preamble Qf the claim and should not be defined, 
other than as requiring the individual claim elements. 

i Without waiving its position that no separate definition is required, if required to 
propose such a definition, InterTrust proposes the following: 

Normal English, incorporating the separately defined terms: Creating a Secure 
Container. ' • , 

Including or addressing . . . organization information . . . desired organization . . . 
and metadata information at least in part specifying at least one step required or desired in 
creation ofsaid first secure container (861.58) 

This is not a claim term, but is instead a series of fragments. Interpretation of this 
phrase is therefore impossible, since the phrase does not appear in the claim. 

At least in part determine specific information required to be included in said first 
secure container contents (861.58) 1 

Normal English, incorporating the separately defined terms: at least partially 
Identify Specific Information that must be included in the first Secure Container. 

Rule designed to control at least one aspect of access to or use of at least a portion of 
said first secure container contents (861 .58) 

Normal English, incorporating the separately defined terms: a Rule that Governs 
at least some of the contents of the Secure Container. 

900.155 

First host processing environment comprising (900.155) 

A Host Processing Environment including (but not limited to), the listed elements. 

Said mass storage storing tamper resistant software (900.155) 

Normal English, incorporating the separately defined terms: a mass storage 

device (e.g., a hard drive) that stores the Tamper Resistant Software. 

Designed to be loaded into said main memory and executed by said central 
trocessing unit (900.155) 

Normal English, incorporating the separately defined term: software designed to 
be loaded into the Memory of a computer and executed by the computer's 
processor. 

Said tamper resistant software comprising: one or more storage locations storing 
aid information (900.155) 

This is not a claim term, but is instead two sentence fragments. Interpretation of 
this phrase is therefore impossible, since the phrase does not appear in the claim. 

20 


INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


5 
6 
7 
8 
9 

10 
11 

12 

13 

14 

15 

16 

17 

18 

19 

20 

21 

22 

23 

24 

25 

26 

27 

28 


Derives information from one or more aspects of said host processing environment 

(900.155) 

Normal English, incorporating the separately defined terms: Derives (including 
creates) Information based on at least one Aspect of the previously referred to 
Host Processing Environment See Specific Information for the definition of 
Information. 

One or more storage locations storing said information (900.155) 

Normal English, incorporating the separately defined terms: Information relating 
to one or more Aspects of the Host Processing Environment is stored in one or 
more locations. See Specific Information for the definition of Information. 

Information previously stored in said one or more storage location? (900.155) 

See Information Previously Stored. The definitions are the same. 

Generates an indication based on the result of said comparison (900.155) 

Normal English: a particular indication is created (e.g., a flag is set or a value is 
returned) if the comparison has one result, but not if the comparison has a 
different result. 

Programming which takes one or more actions based on the state of said indication 

[900.155) 

Normal English: software that takes an action if the indication has one state, but 
does not take that action if the indication does not have that state 

M least temporarily halting further processing (900. 1 55) 

Normal English, incorporating the separately defined terms: Halting Processing, 
the Halt being temporary or permanent. See Securely Processing for the 
defimtiorToTPra^ "*' 

912.8 

Identifying at least one aspect of an execution space (912.8) 

Normal English, incorporating the separately defined terms: Identifying an 

-AspeGt r(e ; g,-Secimtyievel)-of- an Execution Space - 

Required for use and/or execution of the load module (912.8) 

Normal English, incorporating the separately defined terms: the Identified Aspect 
is needed in order for the Load Module to execute or otherwise be used. 

Said execution space identifier provides the capability for distinguishing between 
xecution spaces providing a higher level of security and execution spaces providing a 
ower level of security (912.8) 

Normal English, incorporating the separately defined terms: the Execution Space 
Identifier makes it possible to distinguish higher Security Level Execution Spaces 

.__ 21 


INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


from lower Security level Execution Spaces. . 
Checking said record for validity prior to performing said executing step (912.8) 

t 

Normal English, incorporating the separately defined terms: determining whether 
the Record has Validity, the determination occurring before the execution step. 

i912.35 

Received in a secure container (912.35) 

Normal English, incorporating the separately defined terms: the Record is 
Contained in a Secure Container when acquired. 
Said component assembly allowing access to or use of specified information; (912.35) 

Normal English, incorporating the separately defined terms: the Component 
Assembly allows Access to Specified Information. 

Said first component assembly specified by said first record (912.35) 

' This term is a label referring back to the first component assembly identified 
earlier in the claim. It has no other meaning. ' 

891 J 

Resource processed in a secure operating environment at a first appliance (891.1) 

This term is contained in the preamble of the claim and should not be defined, 
other than as requiring the individual claim elements. 

Without waiving its position that no separate definition is required, if required to 
propose such a definition, InterTrust proposes the following: 

Normal English, incorporating the separately defined terms: a Resource 
Processed in a Secure Operating Environment, the Secure Operating Environment 
being present at an appliance (e.g., a computer). 

Securely receiving a first entity's control at said first appliance (891.1) 

Normal English, incorporating the separately defined terms: an Entity's Control 
is Securely Received at the first appliance. 

This phrase has been designated by Microsoft for interpretation under § 1 12(6). 
InterTrust objects to such designation. Without waiver of such objection, as is 
required by the Local Rules, InterTrust hereby identifies acts corresponding to 
this term: 

Claim elements specifying the act of receiving a file, or the act of establishing 
communications, map onto a large number of structures and acts disclosed in the 
specification, many of which constitute alternate embodiments. These include 
^htainffi^ satellite 
transmissions, physical exchange of media, network transmissions, etc. 

Claim elements specifying the act of "securely receiving" map onto embodiments 
of "receiving" (see above) in which the received element (e.g., a control) is 

22 


303750.01 


INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MET), CONSOLIDATED WITH C 02-0647 SBA 


1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
.46- 
27 
28 


303750.01 


(891.1) 


received in a manner providing security. The specification describes a number of 
security-related mechanisms for use in communications, including encryption, 
authentication and tamper-resistance. Such mechanisms constitute alternate 
embodiments. 

Securely receiving a second entity's control at said first appliance (891 . 1) 

See Securely receiving a first entity's control at said first appliance. The 
. definitions are the same, except that the second entity and the first entity are 
different. 

Securely processing a data item at said first appliance, using at least one resource 

Normal English, incorporating the separately defined terms: a Resource is used 
in Securely Processing a Data Item, die processing occurring at the first appliance. 


Securely applying, at said first appliance through use of said at least one resource 
said first entity's control and said second entity's control to govern use of said data item 
(891.1) 

Normal English, incorporating the separately defined terms: the first Entity's 
Control and the second Entity's Control are Securely Applied to Govern Use of 
the Data Item, the act of Securely Applying involving use of the Resource. 

II. Designation of Evidence under 4-2(b). - 

InterTrust hereby designates the following evidence under Patent Local Rule 4-2 (b), 

without admission that this constitutes "extrinsic evidence" as defined by the Federal Circuit or 

other relevant legal authority. 

Testimony: Dr. Michael Reiter will testify as to the understanding of the claim terms by 
someone of ordinary skill in the art. 

1 . Personal Computer Dictionary (1 995) ISBN 0-892 1 8-223-7 

Access 
Copy 
Record 

2. Computer ProfessionaHs^ictionary,-AHen-Wyatt-(Osbome McGraw-Hill, 1990). ISBN 0- 
07-881705-6 

Access 
Data Item 

Secure database ~ - - ~ ~ 

3. Microsoft Computer Dictionary, Third Edition (1997) ISBN 1-57231-743-4. 


Addressing 
Copy 
Database 
Data Item 


23 


INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MET), CONSOLIDATED WITH C 02-0647 SBA 


1 

2 
3 
4 
5 
6 
7 
8 
9 

10 
11 
12 


Environment 
Executable File 

Loadmoldule 
Memory 
Processing 
Secure container 

i 

1 4. The American Heritage Dictionary, 3d ed. (Houghton Mifflin, 1992) ISBN 0-395-44895-6 
Passim 

i 

1 5. U.S. Patent No. 5,634,019, Col 7:42-44. 
Secure container 

1 6. Webster's New World Dictionary of Computer Terms, 6th Edition (1997) ISBN 0-r-02- 
1861890-4 

Access 
Copy 

Environment 

Operating environment ' 
Secure 


13 [1 7. U.S. Patent No. 5,991,399. 

14 || Tamper resistant software 

15 || 8. "A Tentative Approach to Constructing Tamper-Resistant Software" by Masahiro 
MAMBO.VTakanori MU RAYAMAT, Fiji OKAMOTO, School of Information Science, 

1 6 | Japan Advanced Institute of Science and Technology,l-l Asahidai Tatsunokuchi Nomi, 
I Ishikawa/ 923-121 1 Japan, published in English 1998. 

17 


18 
19 


Tamper 

Tamper resistant software 


20 II Dated: December .2 °, 2002 
21 
22 
23 
24 
25 
26 
27 
28 


KEKER & VAN NEST, LLP 



L. JAY KUC 
Attorneys for Plaintiff and Counter 
Defendant 

INTERTRUST TECHNOLOGIES 
CORPORATION 


24 


303750.01 


INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM CONSTRUCTIONS AND 

IDENTIFICATION OF EVIDENCE 
CASE NO. C 01-1640 SBA (MEJ), CONSOLIDATED WITH C 02-0647 SBA 


1 

2 
3 
4 
5 
6 
7 
8 
9 
10 
11 
12 
13 
14 
15 
16 
17 
18 
19 
20 
21 
22 
23 
24 
25 
26 
27 
28 


PROOF OF SERVICE 

I am employed in the City and County of San Francisco, State of California in the office of a 
member of the bar of this court at whose direction the following service was made. I am over the 
age of eighteen years and not a party to the within action. My business address is Keker & Van 
Nest, LLP, 710 Sansome Street, San Francisco, California 941 1 1. 

On December 20, 2002, 1 served the following documents): 

INTERTRUST'S PATENT LOCAL RULE 4-2 PRELIMINARY CLAIM 
CONSTRUCTIONS AND IDENTIFICATION OF EVIDENCE 

3 by PDF TRANSMISSION AND UNITED STATES MAIL, by transmitting via PDF on this date. A true 
and correct copy of same was placed in a sealed envelope addressed as shown below. I am readily fimifl«w 
with the practice of Keker & Van Nest, LLP for collection and processing of correspondence for mailing. 
According to that practice, items are deposited with the United States Postal Service at San Francisco, 
California on that same day with postage thereon fully prepaid. I am aware that, on motion of the party 
. served, service is presumed invalid if the postal cancellation date or the postage meter date is more than one 
day after the date of deposit for mailing stated in this affidavit 

Eric L Wesenberg, Esq. John D. Vandenberg, Esq. 

Mark R. Weinstein, Esq. James E. Geringer, Esq. 

Drrick Herrington & Sutcliffe Kristin L. Cleveland, Esq. 

i000 Marsh Road Klarquist Sparkman Campbell, et al. 

Vlenlo Park, CA 94025 One World Trade Center, Suite 1600 

relephone: 650/614-7400 121 S.W. Salmon Street 

Facsimile: 650/614-7401 Portland OR 97204 

Telephone: 503/226-7391 
Facsimile: 503/228-9446 


declare under penalty of perjury under the laws of the State of California that the above is true 
ind correct. 

ixecuted on December 20, 2002, at Sa^f Francisco, Califo: 



NOELLE S. NICHOL 



PROOF OF SERVICE 
CASE NO. C01-1640 SBA (MET) CONSOLIDATED WITH C 02-0647 SBA